|
[1] Shaojie Bai, J. Zico Kolter, and Vladlen Koltun. An empirical evaluation of generic convolutional and recurrent networks for sequence modeling. CoRR, abs/1803.01271, 2018. [2] James R. Binkley and Suresh Singh. An algorithm for anomaly-based botnet detection. In Proceedings of the 2Nd Conference on Steps to Reducing Unwanted Traffic on the Internet. USENIX Association, 2006. [3] Botnet topology. https://www.researchgate.net/figure/Typical-Clie nt-Server-Botnet-Command-and-Control-Topology_fig1_266209917. [4] H. Choi, H. Lee, H. Lee, and H. Kim. Botnet detection by monitoring group activities in dns traffic. In 7th IEEE International Conference on Computer and Information Technology, Oct 2007. [5] Dynamic generation algorithms. https://en.wikipedia.org/wiki/Domain_generation_algorithm. [6] M. Feily, A. Shahrestani, and S. Ramadass. A survey of botnet and botnet detection. In Third International Conference on Emerging Security Information, Systems and Technologies, June 2009. [7] S. García, M. Grill, J. Stiborek, and A. Zunino. An empirical comparison of botnet detection methods. Comput. Secur., 45:100–123, September 2014. [8] Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee. Botminer: Clustering analysis of network traffic for protocol- and structure-independent botnet detection. In Proceedings of the 17th Conference on Security Symposium, SS’08. USENIX Association, 2008. [9] Sepp Hochreiter. The vanishing gradient problem during learning recurrent neural nets and problem solutions. Int. J. Uncertain. Fuzziness Knowl.-Based Syst., April 1998. [10] Sepp Hochreiter and Jürgen Schmidhuber. Long short-term memory. Neural Comput., November 1997. [11] Sajad Homayoun, Marzieh Ahmadzadeh, Sattar Hashemi, Ali Dehghantanha, and Raouf Khayami. BoTShark: A Deep Learning Approach for Botnet Traffic Detection, pages 137–153. 01 2018. [12] Behind the numbers: Growth in the internet of things (March 2015). https://cdn.ihs.com/www/pdf/enabling-IOT.pdf. [13] L. C. Jain and L. R. Medsker. Recurrent Neural Networks: Design and Applications. CRC Press, Inc., Boca Raton, FL, USA, 1st edition, 1999. [14] Anestis Karasaridis, Brian Rexroad, and David Hoeflin. Wide-scale botnet detection and characterization. In Proceedings of the First Conference on First Workshop on Hot Topics in Understanding Botnets. USENIX Association, 2007. [15] Wikipedia: Mirai. https://en.wikipedia.org/wiki/Mirai_(malware). [16] Pysahrk. https://kiminewt.github.io/pyshark/. [17] S. Siboni and A. Cohen. Botnet identification via universal anomaly detection. In 2014 IEEE International Workshop on Information Forensics and Security (WIFS), pages 101–106, Dec 2014. [18] Smominru (Feb 2018). https: //www.cyber.nj.gov/threat-profiles/botnet-variants/smominru. [19] Snort (march 2016). https://www.snort.org/. 20] Wikipedia: Softmax function). https://en.wikipedia.org/wiki/Softmax_function. [21] Duc Tran, Hieu Mac, Van T Tong, Hai Anh Tran, and Linh Giang Nguyen. A lstm based framework for handling multiclass imbalance in dga botnet detection. Neurocomputing, 2018. [22] Tshark. https://www.wireshark.org/docs/man-pages/tshark.html. [23] R. Villamarin-Salomon and J. C. Brustoloni. Identifying botnets using anomaly detection techniques applied to dns traffic. In 2008 5th IEEE Consumer Communications and Networking Conference, pages 476–481, Jan 2008. [24] Wei Wang, Ming Zhu, Xuewen Zeng, Xiaozhou Ye, and Yiqiang Shengand. Malware traffic classification using convolutional neural network for representation learning. In 2017 International Conference on Information Networking, Jan 2017. [25] J. Ziv and A. Lempel. Compression of individual sequences via variable-rate coding. In 1978 IEEE Transactions on Information Theory, pages 530–536, Sep 1978. |